Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
47 views10 pages

Wireshark Analysis

The document provides an analysis of network traffic using Wireshark, focusing on the IP address 192.168.0.103. It discusses various communication patterns, including data exchange rates, interactions with external IPs, and potential security threats, while highlighting the importance of analyzing abnormal activities and expert information outputs. The conclusion emphasizes Wireshark's versatility as a tool for network analysis and security monitoring.

Uploaded by

Ruth Akinyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views10 pages

Wireshark Analysis

The document provides an analysis of network traffic using Wireshark, focusing on the IP address 192.168.0.103. It discusses various communication patterns, including data exchange rates, interactions with external IPs, and potential security threats, while highlighting the importance of analyzing abnormal activities and expert information outputs. The conclusion emphasizes Wireshark's versatility as a tool for network analysis and security monitoring.

Uploaded by

Ruth Akinyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

1

Wireshark Analysis

Your Name Here

University Name

Course Name & Number

Instructor

Due Date
2

Introduction

Wireshark is an open-source packet analytics tool used for network analysis,

troubleshooting, software and communications protocol development, and for educational

purposes. For educational purposes, we use the tool to identify communication trends, possible

security threats, and network anomalies associated with the IP address 192.168.0.103. By

delving into various Wireshark functionalities, including conversation analysis, HTTPS and TCP

port analysis, and expert information examination, we provide information about the network

communications of a typical user and shed light the possible applications of Wireshark in

network analysis and troubleshooting.

Captured Activities

Conversations Analysis
3

My IP address seems to be the address that appears most frequently in the “Address A”

column; that is 192.168.0.103. For internal access, my IP Address communicates with a gateway

router (192.168.0.1) for internet access. The interactions between my IP address and others

depend on the services and websites I was accessing during the capturing process.

There’s a significant traffic between 192.168.0.103 and 104.26.6.138, with my address

receiving 244 kB of data and sending 2 kB of data. The connection lasted about 49 seconds at an

average rate of 39 kbps from 104.26.6.138 to my address and 357 bits/s in the opposite direction.

My address exchanges a smaller amount of traffic with 185.157.213.253 (associated with

GhostSocks malware), with my address receiving only 1 kB and sending 624 bytes. The duration

is approximatel 41 seconds, with rates of 166 and 122 bits/s respectively. In the interaction
4

between 192.168.0.103 and 35.174.127.31 (Amazon), my address sends 2 kB and receives 1 kB

in 48 seconds and data rates of 180 and 272 bits/s.

A larger amount of data is exchanged between 192.168.0.103 and 35.190.80.1, with my

address sending 8 kB and receiving 6 kB in 30 seconds. There’s minimal interaction with

35.227.232.140. 192.168.0.103 sends 55 bytes and receives 66 bytes in a very short span of 0.04

seconds. However, the data rates are significantly high at 10 kbps and 12 kbps. 192.168.0.103

sends 327 bytes to 38.244.132.66 (GhostSocks) and receives 378 bytes over approximately 31

seconds with data rates of 85 and 98 bits/s. The address sends 306 bytes to 52.207.122.56

(Quora.com) and receives 186 bytes in 31 seconds, with data rates of 78 and 47 bits/s.

192.168.0.103 sends 534 bytes to 57.144.139.32 (Facebook) and receives 558 bytes in 43

seconds with data rates of 98 and 103 bits/s. 192.168.0.103 sends 110 bytes to 64.233.167.188

(Google.com) and in return, receives 132 bytes over 45 seconds, with data rates of 19 and 23

bits/s. This address sends 55 bytes to an external server (103.165.192.202) and receives 66 bytes

over a very tiny duration of 0.2 seconds; but with very high data rates of 2188 and 2626 bits/s. It

also sends 55 bytes to Cloudflare, Inc. (104.16.117.55) and receives 66 bytes in just 0.0349

seconds, with high data rates of 12 and 15 kbps.

Additionally, my address interacts with multicast addresses. It sends 50 bytes to 224.0.0.1

multicast address – associated with all hosts on the subnet. The 224.0.0.22 multicast

address associated with Internet Group Management Protocol (IGMP) Version 3 receives 162

bytes from my IP address. 192.168.0.100 and 192.168.0.101 send data to 224.0.0.251.

Exploration of Additional Tabs

Another tab that captured my interest was the TCP tab.


5

Port A and B columns indicate the TCP port numbers used in the communication (Sharpe

et al., 2019). I noticed that my IP address utilizes various high-numbered ports – such as 62932,

62918, and 63081 –typical for client-side ephemeral ports (Gee, 2024). I also noticed that, most

of Address B entries utilize Port 443 which show secure HTTP (HTTPS). Therefore, I could be

rest assured that my IP address potentially initiates secure web connections to various servers.

The prevalence of HTTPS traffic is the norm as most most websited today use Port 443.

The various addresses under Address B are the various web services or servers my IP address is

interacting with. For instance, 52.207.122.56 is associated with Amazon Web Services servers

and 35.190.80.1 with the Google Cloud Platform. The presence of port 3323 alongside IP

address 185.81.157.19 is surprising because services associated with it are not know – in some

cases it’s associated with security risks and trojans. Just like with the Ipv4 tab, in the TCP tab,

Bytes A→B and Bytes B→A columns indicate the amount of data transferred in

both directions. This enables us to identify and compare the connections that

download huge amounts of data against those that just send data.
6

The 104.26.6.138:443 ⇋ 192.168.0.103:62938 connection involves the sending of 244

kB of data from 104.26.6.138 (Cloudflare.inc) to 192.168.0.103 and a reverse connection

involving 2 kB. The duration of the connection was 49 seconds. Since the connection uses port

443, we conclude that Cloudflare.inc is a secure website or at least the API

request was safe. The 185.157.213.253:14371 ⇋ 192.168.0.103:62932

interaction involved 1 kB of data from the latter to the former and 624 bytes

in the reverse direction – a connection that lasted approximately 41 seconds. This

connection uses high-numbered ports. The 172.67.69.49:443 ⇋ 192.168.0.103:62900 connection

involves sending 55 bytes of data from my IP address to 172.67.69.49 and 66 bytes sent in the

opposite direction over 0.085 seconds. The presence of Port Port 443 indicates a HTTPS traffic,

possibly API request or a website.

Analysis of Abnormal Activities

There are multiple Domain Name System (DNS) queries for “x.com”. This is normal

because I was browsing the site at that time; however, the repeated queries may be an indication
7

that something is frquently trying to resolve this request. The queries for “a.u10.twtrdns.net”

could not be understood. The frequent queries for “x.com” (lines 1, 2, 6, 7, 10, 11, 13, 14, and

15) are strange. Even though browsing the social media site would trigger these queries, the

repetitions and the fact that both A and HTTPS records are repeatedly queried could mean that

some application or script is consistently trying to resolve this domain. Therefore, it would be

better to find out which device on the network is making these requests. If it is found that the

determined device should not be accessing the website frequently, that’s a red flag.

While interaction with external IP addresses is normal, the exact external IP addresses

and ports should be clear. The traffic to 172.66.0.2... should be investigated by performing

reverse DNS lookups on them to find out the organizations or domain names associated with

them. This strategy can be used to determine whether the questionable IP addresses are

associated with security risks, trojans, and malicious activity. The IP addresses can also be

checked against intelligence databases such as AbuseIPDB and VirusTotal.

Port 443 is mostly associated with HTTPS traffic over TCP. According to Sophos (2022),

it is not normal to see UDP traffic on port 443. The presence of UDP traffic on the port could

mean that there is a wrongly-configured application or possibly a security breach attempt. The

traffic on Port 62105 also warrants investigation. Therefore, we should examine the contents of

the UDP packets to figure out the type of data being transmitted. The service or application

generating the UDP traffic needs to be investigated. The IP address 172.66.0.227

(Cloudflare.com) on is shared by several applications. Even though AbuseIPDB reports that the

address is from within its whitelist belonging to the subnet 172.64.0.0/13, identified as

“Cloudflare Reverse Proxy”, there have been reports of abusive activity such as phishing/spam
8

landing pages and brute-force SSH attempts (Cloudflare, 2023). CheckPhish Scanner also

associates it with phishing.

Wireshark Expert Information Output

The “Ignored Unknown Record (Protocol: TLS, Count: 1)” warning means that the

Transport Layer Security (TLS) layer encountered a record type it did not acknowledge. A quick

search on Wireshark Q&A reveals that the problem could be a protocol mismatch, an abnormal

packet, or someone is trying to use non-standard protocol extension. This warning needs to be

investigated because it could suggest the presence of a security threat, a misconfiguration, or

someone is trying to take advantage of a loophole.

The DNS response missing (Protocol: mDNS, Count: 3) could mean that a multicast DNS

request was sent but it did not receive a reply. According to Oracle (2023), the mDNS protocol is

mainly used to deliver services on the local network such as on printer or device recovery. This

warning should be investigated because it could indicate a potential problem with the LAN, a

device in the local network is not responding well, or may be a device has exited the network.
9

Wireless Q&A (2025) states that the warnings, “Previous segment(s) not captured (common at

capture start)” and “ACKed segment that wasn't captured (common at capture start)” is a

common warning when the capture begins in the midst of a TCP connection. Wireshark did not

see send acknowledgement for data it did not see. The warning does not warrant an investigation

because this is usually not harmful, especially when it occurs at the beginning of the capture.

The warning “DNS response retransmission (Protocol: mDNS, Count: 11)” means that

there was a DNS retransmission; this could mean that the initial response may have been lost or

the client did not receive it. Even though Wireless Q&A (2025) says that it is normal to get

occasional retransmissions; however, if the retransmissions are frequent, they could suggest a

problem with the DNS server or network congestion.

Conclusion

Initially, I thought that matters of network analysis and security involve expensive

software till I got entangled with Wireshark. The application is extremely versatile in network

analysis and enables you to capture and explore network traffic in real-time. The product enabled

me to analyze individual packets and understand the communication protocols involved and

determine whether some IP addresses are associated with security threats. You can find out is a

connection is a security threat by performing a reverse DNS lookup or use threat intelligence

databases. I was able to filter traffic according to network addresses, protocols, and ports to

determine where there are anomalies. The expert information output highlights abnormalities and

questionable network behaviors detected in network traffic, enabling analysis and

troubleshooting. Therefore, Wireshark is a great tool for network admins and security

professionals.
10

References

Cloudflare. (2023, November 30). SSH bruteforce attempts from behind CF IP’s. Cloudflare

Community. https://community.cloudflare.com/t/ssh-bruteforce-attempts-from-behind-cf-

ips/331580

Gee, T. (2024, June 17). Ephemeral vs. Non-Ephemeral Ports. Technology Gee.

https://www.technologygee.com/ephemeral-vs-non-ephemeral-ports/

Oracle. (2023). Multicast DNS and Service Discovery (System Administration Guide: Naming

and Directory Services (DNS, NIS, and LDAP)). Docs.oracle.com.

https://docs.oracle.com/cd/E19120-01/open.solaris/819-3194/dnsref-28/index.html

Sharpe, R., Warnicke, E., & Lamping, U. (2019). Wireshark User’s Guide. Wireshark.org.

https://www.wireshark.org/docs/wsug_html/

Sophos. (2022, November 8). QUIC: https on udp - Web Protection: Web Filtering &

Application Visibility/Control - UTM Firewall - Sophos Community - Connect, Learn,

and Stay Secure. Sophos.com. https://community.sophos.com/utm-firewall/f/web-

protection-web-filtering-application-visibility-control/116500/quic-https-on-udp

Wireshark Q&A. (2025). Wireshark Q&A. Wireshark.org.

https://osqa-ask.wireshark.org/questions/703/ssl-and-tls-ignored-unknown-record/

You might also like